scroll to top
Stuck on your essay?
Get ideas from this essay and see how your work stacks up
Word Count: 1,189
Computer Privacy Issues An issue of concern at is Computer privacy Computer privacy techniques have been developed to protect single computers and network-linked computer systems from accidental or intentional harm The main reason for protecting these computers is to keep them from physical loss of data deception of computer users and the deliberate invasion of databases by unauthorized individuals Computers and the information they contain are considered confidential systems as they are used mostly to a limited number of users Confidentiality and the possession of information can be violated by unauthorized users who shoulder surf or by observing another users computer screen Also by tricking authorized users into revealing confidential information wiretapping or listening in on or recording electronic communications people who wont to invade our privacy can easily do so Several techniques are used to prevent computer crimes such as Encryption Approved Users Passwords Fire Walls Security Servers Integrity and availability Encryption Using encryption is a very good way of preventing our privacy being violated with this information can be scrambled and unscrambled using mathematical equations and a secret code called a key Two keys are usually used one to encode make the calculation and the other to decode calculate the equation the information The keys that encodes the data are called the private key and are only kept in the hands of the sender The key that decodes the data which is called the public key can be possessed by several receivers Keys are modified periodically keeping unauthorized access and making the encrypted information difficult to decode if it comes in the hands of someone else Approved Users Another technique to prevent computer crime is to limit access of computer data files to approved users Access-control software is a good way of keeping privacy as it verifies computer users and limits their privileges to view and change files Records can be kept of what
@Kibin is a lifesaver for my essay right now!!
- Sandra Slivka, student @ UC Berkeley
Wow, this is the best essay help I've ever received!
- Camvu Pham, student @ U of M
If I'd known about @Kibin in college, I would have gotten much more sleep
- Jen Soust, alumni @ UCLA